OneCon Logo Don’t miss OneCon23! SentinelOne’s Customer Conference. Register Now
Don’t miss OneCon23! SentinelOne’s Customer Conference.
Experiencing a Breach?
  • 1-855-868-3733
  • Contact
  • Cybersecurity Blog
en
  • English
  • 日本語
  • Deutsch
  • Español
  • Français
  • Italiano
  • Dutch
  • 한국어
S1 Logo Color Light S1 Logo Color
Platform
  • Platform Overview
    • Singularity Platform Welcome to Integrated
      Enterprise Security
    • Singularity XDR Native & Open Protection,
      Detection, and Response
    • Singularity Data Lake AI-Powered,
      Unified Data Lake
    • How It Works The Singularity XDR Difference
    • Singularity Marketplace One-Click Integrations to Unlock the Power of XDR
  • Surfaces
    • Endpoint Autonomous Prevention, Detection, and Response
    • Cloud Autonomous Runtime Protection for Workloads
    • Identity Autonomous Identity & Credential Protection
  • Platform Packages
    • Singularity Complete The Standard for Enterprise Cybersecurity
    • Singularity Control Organization-Wide
      Protection and Control
    • Singularity Core Cloud-Native NGAV
    • Package Comparison Our Platform at a Glance
  • Platform Products
    • Singularity Cloud Container, VM, and Server Workload Security
    • Singularity Mobile Mobile Threat Defense
    • Singularity Cloud Data Security AI-Powered Threat Detection
    • Singularity RemoteOps Orchestrate Forensics at Scale
    • Singularity Identity Identity Threat Detection
      and Response
    • Singularity CloudFunnel Cloud-to-Cloud Telemetry Streaming
    • Singularity Ranger AD Active Directory Attack Surface Reduction
    • Singularity BinaryVault Automatic File Sample Collection
    • Singularity Ranger Rogue Asset Discovery
    • Singularity Hologram Deception Protection
Why SentinelOne?
  • Why SentinelOne?
    • Why SentinelOne? Cybersecurity Built
      for What’s Next
    • Our Customers Trusted by the World’s Leading Enterprises
    • Industry Recognition Tested and Proven
      by the Experts
    • About Us The Industry Leader in Autonomous Cybersecurity
  • Compare SentinelOne
    • CrowdStrike Cyber Dependent
      on a Crowd
    • McAfee Pale Performance,
      More Maintenance
    • Microsoft Platform Coverage
      That Compromises
    • Trend Micro The Risk of DevOps Disruption
    • Palo Alto Networks Hard to Deploy,
      Harder to Manage
    • Carbon Black Adapt Only as Quickly
      as Your Block Lists
    • Symantec Security Limited
      to Signatures
  • Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
Services
  • Threat Services
    • Vigilance Respond Pro
      MDR + DFIR
      24x7 MDR with Full-Scale Investigation & Response
    • WatchTower Pro
      Threat Hunting
      Dedicated Hunting & Compromise Assessment
    • Vigilance Respond
      MDR
      Dedicated SOC
      Expertise & Analysis
    • WatchTower
      Threat Hunting
      Hunting for Emerging Threat Campaigns
    Services Overview
  • Support, Deployment, & Health
    • Technical Account Management Customer Success with Personalized Service
    • SentinelOne GO Guided Onboarding & Deployment Advisory
    • SentinelOne University Live and On-Demand Training
    • Support Services Tiered Support Options for Every Organization
    • SentinelOne Community Community Login
Partners
  • Our Network
    • MSSP Partners Succeed Faster
      with SentinelOne
    • Singularity Marketplace Extend the Power
      of S1 Technology
    • Cyber Risk
      Partners
      Enlist Pro Response
      and Advisory Teams
    • Technology Alliances Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS Hosted in AWS Regions Around the World
    • Channel Partners Deliver the Right
      Solutions, Together
    Program Overview
Resources
  • Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • White Papers
    View All Resources
  • Blog
    • Cyber Response
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog
  • Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
About
  • About SentinelOne
    • About SentinelOne The Industry Leader in Cybersecurity
    • Investor Relations Financial Information & Events
    • SentinelLABS Threat Research for
      the Modern Threat Hunter
    • Careers The Latest Job Opportunities
    • Press & News Company Announcements
    • Cybersecurity Blog The Latest Cybersecurity Threats, News, & More
    • F1 Racing SentinelOne &
      Aston Martin F1 Team
    • FAQ Get Answers to Our Most Frequently Asked Questions
    • DataSet The Live Data Platform
    • S Foundation Securing a Safer Future for All
    • S Ventures Investing in the Next Generation
      of Security and Data
    • Brand SentinelOne Brand Guidelines
en
  • English
  • 日本語
  • Deutsch
  • Español
  • Français
  • Italiano
  • Dutch
  • 한국어
Get a Demo
S1 Logo Color Light S1 Logo Color
Navigation Arrow Left Back
Navigation Close
Platform
  • Platform Overview
    • Singularity Platform Welcome to Integrated
      Enterprise Security
    • Singularity XDR Native & Open Protection,
      Detection, and Response
    • Singularity Data Lake AI-Powered,
      Unified Data Lake
    • How It Works The Singularity XDR Difference
    • Singularity Marketplace One-Click Integrations to Unlock the Power of XDR
  • Surfaces
    • Endpoint Autonomous Prevention, Detection, and Response
    • Cloud Autonomous Runtime Protection for Workloads
    • Identity Autonomous Identity & Credential Protection
  • Platform Packages
    • Singularity Complete The Standard for Enterprise Cybersecurity
    • Singularity Control Organization-Wide
      Protection and Control
    • Singularity Core Cloud-Native NGAV
    • Package Comparison Our Platform at a Glance
  • Platform Products
    • Singularity Cloud Container, VM, and Server Workload Security
    • Singularity Mobile Mobile Threat Defense
    • Singularity Cloud Data Security AI-Powered Threat Detection
    • Singularity RemoteOps Orchestrate Forensics at Scale
    • Singularity Identity Identity Threat Detection
      and Response
    • Singularity CloudFunnel Cloud-to-Cloud Telemetry Streaming
    • Singularity Ranger AD Active Directory Attack Surface Reduction
    • Singularity BinaryVault Automatic File Sample Collection
    • Singularity Ranger Rogue Asset Discovery
    • Singularity Hologram Deception Protection
Why SentinelOne?
  • Why SentinelOne?
    • Why SentinelOne? Cybersecurity Built
      for What’s Next
    • Our Customers Trusted by the World’s Leading Enterprises
    • Industry Recognition Tested and Proven
      by the Experts
    • About Us The Industry Leader in Autonomous Cybersecurity
  • Compare SentinelOne
    • CrowdStrike Cyber Dependent
      on a Crowd
    • McAfee Pale Performance,
      More Maintenance
    • Microsoft Platform Coverage
      That Compromises
    • Trend Micro The Risk of DevOps Disruption
    • Palo Alto Networks Hard to Deploy,
      Harder to Manage
    • Carbon Black Adapt Only as Quickly
      as Your Block Lists
    • Symantec Security Limited
      to Signatures
  • Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
Services
  • Threat Services
    • Vigilance Respond Pro
      MDR + DFIR
      24x7 MDR with Full-Scale Investigation & Response
    • WatchTower Pro
      Threat Hunting
      Dedicated Hunting & Compromise Assessment
    • Vigilance Respond
      MDR
      Dedicated SOC
      Expertise & Analysis
    • WatchTower
      Threat Hunting
      Hunting for Emerging Threat Campaigns
    Services Overview
  • Support, Deployment, & Health
    • Technical Account Management Customer Success with Personalized Service
    • SentinelOne GO Guided Onboarding & Deployment Advisory
    • SentinelOne University Live and On-Demand Training
    • Support Services Tiered Support Options for Every Organization
    • SentinelOne Community Community Login
Partners
  • Our Network
    • MSSP Partners Succeed Faster
      with SentinelOne
    • Singularity Marketplace Extend the Power
      of S1 Technology
    • Cyber Risk
      Partners
      Enlist Pro Response
      and Advisory Teams
    • Technology Alliances Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS Hosted in AWS Regions Around the World
    • Channel Partners Deliver the Right
      Solutions, Together
    Program Overview
Resources
  • Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • White Papers
    View All Resources
  • Blog
    • Cyber Response
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog
  • Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
About
  • About SentinelOne
    • About SentinelOne The Industry Leader in Cybersecurity
    • Investor Relations Financial Information & Events
    • SentinelLABS Threat Research for
      the Modern Threat Hunter
    • Careers The Latest Job Opportunities
    • Press & News Company Announcements
    • Cybersecurity Blog The Latest Cybersecurity Threats, News, & More
    • F1 Racing SentinelOne &
      Aston Martin F1 Team
    • FAQ Get Answers to Our Most Frequently Asked Questions
    • DataSet The Live Data Platform
    • S Foundation Securing a Safer Future for All
    • S Ventures Investing in the Next Generation
      of Security and Data
    • Brand SentinelOne Brand Guidelines
Get a Demo
  • 1-855-868-3733
  • Contact
  • Cybersecurity Blog
Experiencing a Breach?
  • 1-855-868-3733
  • Contact
  • Cybersecurity Blog
Singularity Ranger® is a cloud delivered,
software-defined network discovery solution
designed to add global visibility and
control with minimal friction.
Get a Demo Cta Left Left White

What’s on Your Network?

Ranger Extends Sentinel Agent Function by Reporting What It Sees on Networks and Enables Blocking of Unauthorized Devices.

Network Visibility 72 PURP

Network
Visibility

Ranger learns the network in a controlled manner with one click. Customizable scanning policies help avoid violating privacy statutes in a frictionless, transparent manner.

Network Control 72 PURP

Network
Control

When unauthorized devices appear on sensitive networks, Ranger protects managed assets from unauthorized communications with one click.

No New Software Hardware 72 PURP

No New Software
or Hardware

Sentinels intelligently elect which agents perform the cloud delivered distributed learning. Ranger does not require added hardware or network changes.

Easy Implementation

  • No new software required. Ranger is part of the SentinelOne agent code base.
  • No network changes required. No network SPAN or TAP ports.
  • Build a policy and toggle it on. Admins can specify a different policy for each network and subnet if needed.
  • Policies provide control over scan intervals and what should be scanned and what must never be scanned.
  • Choose between auto-enabled scanning or require explicit permission if more control is needed over the environment.
Get a Demo Cta Left Left White

Unparalleled Visibility

  • Ranger is network efficient by intelligently electing a few Sentinel agents per subnet to participate in network mapping missions.
  • Elected “Rangers” passively listen for network broadcast data including ARP, DHCP, and other network observances.
  • Admins may customize active scan policies and specify multiple IP protocols for learning including ICMP, SNMP, UDP, TCP, SMB, and more.
  • Rangers correlate all learned information within the backend to fingerprint known and unknown devices.
  • Ranger reveals vital information about IP-enabled devices and produces inventories in seconds across your region or the globe.

Granular Control

  • Ranger device inventories reveal what is connected where and the protocols these devices listen on.
  • Get easy access to known device information via data collected by Rangers.
  • Find and close Sentinel agent deployment gaps with Ranger Deploy, a peer-to-peer deployment feature.
  • Monitor how unknown devices communicate with managed hosts.
  • Isolate suspicious devices from managed devices with a click.

SentinelOne Singularity Ranger FAQ

Can I prevent Ranger from scanning home, coffee shop, and customer networks when my employees are on the road? Navigation Arrow Down Light

Absolutely yes! Ranger policies have several settings to maintain administrative control over what is and is not scanned. A few examples…. You can set a minimum number of Sentinel agents that must be on a subnet before the system event considers it as a possibility. If you set the number at, say 5, small home networks and coffee shops are unlikely to be scanned because you probably will never have 5 work computers on those networks at any one time. Further, administrators can require an explicit “yes, scan this network” from within the SentinelOne Singularity console to further control what is analyzed.

Rogues vs. Ranger. What’s the difference? Navigation Arrow Down Light

Rogues and Ranger are both built into the agent. The capabilities differ based on the purchased license level. Rogues is a free feature included in the Singularity Complete and Singularity Control product bundles and informs administrators which devices on the network still require a Sentinel agent. Ranger is a full featured add-on product with multiple added network visibility and control capabilities that report on all IP-enabled device types.

I am concerned about harming Operational Technology (OT) equipment in factories, power plants, or other industrial settings all of which may run TCP/IP, SCADA, Modbus or other protocols. Or, I simply run sensitive IP-enabled equipment like healthcare modalities (blood pumps, ventilators, and others). I do not want to disrupt the network operation of this critical equipment. Can I use Ranger on these networks? Navigation Arrow Down Light

We understand this concern and have built in per-network policy controls so that you can use every type of scan technique on some networks but then selectively use only certain network learning methods on others. For example, you can turn off active scan probes altogether and just rely on passive network listening on an OT network. Or, you might use passive listening plus ICMP and SNMP active scanning probes but NOT use TCP connect scans because you are worried about destabilizing certain types of control units that use IP and the SCADA protocol. These are just examples. The point is, administrators can mix and match a wide variety of scanning and passive listening techniques on a per network basis to discover what is connected where and how it is communicating.

Does Ranger support the gathering of asset inventories? Navigation Arrow Down Light

Yes! Ranger will build out an asset inventory for every scanned network and let you export the data.

How does Ranger block unknown devices? Navigation Arrow Down Light

When an administrator chooses to block a device, that device is effectively isolated from all SentinelOne managed Windows, Mac, and Linux hosts. This is accomplished using local network control firewall rules as enforced by the Sentinel agent on those devices. SentinelOne continues to build out the Ranger instrumentation to provide additional network access controls in the future.

How will I know if a new, unknown device joins a network I consider to be sensitive? Navigation Arrow Down Light

Ranger combines capabilities with Deep Visibility ActiveEDR and our Storyline Active Response Engine (STAR) to alert you when a new device without a Sentinel agent has connected to the networks of your choice. You may then take the response of your choosing including block communications from the unknown device.

Ready to Take a Look?

Experience cybersecurity that prevents threats at faster speed, greater scale, and higher accuracy.

Explore SentinelOne

Thanks for Contacting Us

A Sentinelone Representative Will Contact You Shortly to Discuss Your Needs.

Related Resources

DATA SHEET

Singularity EPP + EDR

Learn More Cta Left Left White
DATA SHEET

Vigilance MDR

Learn More Cta Left Left White
DATA SHEET

Endpoint Protection Bundles

Learn More Cta Left Left White
DATA SHEET

SentinelOne Ranger®

Learn More Cta Left Left White

The World’s Leading and Largest Enterprises Trust SentinelOne

Including 4 of the Fortune 10 and hundreds of the global 2000
Logogrid Samsung 1
Logogrid EA 2
Logogrid Mckesson 1
Logogrid EsteeLauder 1
Logogrid Sysco 2
Logogrid AstonMartin 1
Logogrid Shutterfly 2
Logogrid Politico 2
Logogrid Pandora 1
Logogrid Oneil 1
Logogrid NorwegianAir 1
Logogrid Naver

Backed by the Industry

Tried and Trusted by the Industry’s Leading Authorities, Analysts, and Associations.

Gartner Primary Logo WHT 1

Endpoint Protection Platforms

  • A Leader in the 2022 Magic Quadrant for Endpoint Protection Platforms
  • Highest Ranked in all Critical Capabilities Report Use Cases
Learn More Cta Left Left White
MITRE Engenuity Logo WHT 1

Record Breaking ATT&CK Evaluation

  • No missed detections. 100% visibility.
  • Most Analytic Detections 2 yrs running
  • Zero Delays. Zero Config Changes.
Learn More Cta Left Left White
Gartner Peer Insights 2023 Hp

98% of Gartner Peer Insight™

  • 4.8/5 Rating for Endpoint Protection Platforms and Endpoint Detection and Response Solutions
  • 96% Recommend SentinelOne
Learn More Cta Left Left White

Explore the Full Power of Singularity

S1 Singularity Cloud STACK RGB WHT 3

Simplifying container and VM security, no matter their location, for maximum agility, security, and compliance.

Learn More Cta Left Left White
S1 Singularity Core STACK RGB WHT 2

Endpoint security bedrock for organizations replacing legacy AV or NGAV with an effective EPP that is easy to deploy and manage.

Learn More Cta Left Left White
S1 Singularity Control STACK RGB WHT 2

Made for organizations seeking the best-of-breed cybersecurity with additional security suite features.

Learn More Cta Left Left White
S1 Singularity Complete STACK RGB WHT 2

Made for organizations seeking enterprise-grade prevention, detection, response and hunting across endpoint, cloud, and IoT.

Learn More Cta Left Left White

Purpose Built to Prevent Tomorrow’s Threats. Today.

Your most sensitive data lives on the endpoint and in the cloud. Protect what matters most from cyberattacks. Fortify the edges of your network with realtime autonomous protection.
Get a Demo
Company
  • Our Customers
  • Why SentinelOne
  • Platform
  • About
  • Partners
  • Support
  • Careers
  • Legal & Compliance
  • Security & Compliance
  • Contact Us
  • Investor Relations
Resources
  • Blog
  • Labs
  • Hack Chat
  • Press
  • News
  • FAQ
  • Resources
  • Ransomware Anthology
Global Headquarters

444 Castro Street
Suite 400
Mountain View, CA 94041

+1-855-868-3733

[email protected]

Sign Up For Our Newsletter
Thank you! You will now receive our weekly newsletter with all recent blog posts. See you soon!
English
  • English
  • 日本語
  • Deutsch
  • Español
  • Français
  • Italiano
  • Dutch
  • 한국어
©2023 SentinelOne, All Rights Reserved.
Privacy Policy Master Subscription Agreement
Footer Logo
Social Twitter White Social Facebook White Social Linkedin White Social Youtube White